Create an Account
username: password:
 
  MemeStreams Logo

In And Out Through The Backdoor

search

noteworthy
Picture of noteworthy
My Blog
My Profile
My Audience
My Sources
Send Me a Message

sponsored links

noteworthy's topics
Arts
  Literature
   Fiction
   Non-Fiction
  Movies
   Documentary
   Drama
   Film Noir
   Sci-Fi/Fantasy Films
   War
  Music
  TV
   TV Documentary
Business
  Tech Industry
  Telecom Industry
  Management
Games
Health and Wellness
Home and Garden
Miscellaneous
  Humor
  MemeStreams
   Using MemeStreams
Current Events
  War on Terrorism
  Elections
  Israeli/Palestinian
Recreation
  Cars and Trucks
  Travel
   Asian Travel
Local Information
  Food
  SF Bay Area Events
Science
  History
  Math
  Nano Tech
  Physics
  Space
Society
  Economics
  Education
  Futurism
  International Relations
  History
  Politics and Law
   Civil Liberties
    Surveillance
   Intellectual Property
  Media
   Blogging
  Military
  Philosophy
Sports
Technology
  Biotechnology
  Computers
   Computer Security
    Cryptography
   Human Computer Interaction
   Knowledge Management
  Military Technology
  High Tech Developments

support us

Get MemeStreams Stuff!


 
In And Out Through The Backdoor
Topic: Telecom Industry 7:47 pm EST, Feb  4, 2010

Steve Bellovin et al:

Architecture matters a lot, and in subtle ways.

Decius:

Internet protocols are complicated and sometimes they fail in subtle ways that defy naive assumptions.

Tom Cross:

These are harder problems that require more thought.

Thomas Powers:

Is more what we really need?

Tom Cross:

We need to balance privacy interests with the state's interest in monitoring suspected criminals.

Bruce Schneier:

Will not wearing a life recorder be used as evidence that someone is up to no good?

Noam Cohen's friend:

Privacy is serious. It is serious the moment the data gets collected, not the moment it is released.

Andy Greenberg:

And once data has been collected using the lawful intercept, it can be sent to any destination, not merely to an authorized user.

Jean-Luc Godard:

It's not where you take things from -- it's where you take them to.

Straw Man:

It's gonna be cool. Give me money. No consequences, no whammies, money.

Tom Cross:

It's not just the router vendor and the [Internet service provider] who have an interest in how this interface is built.

We all do.

Viktor Chernomyrdin:

We wanted the best, but it turned out as always.

Tom Cross:

The situation is fairly bleak.

Decius:

The ship has already sailed on the question of whether or not it's reasonable for the government to collect evidence about everyone all the time so that it can be used against them in court if someone accuses them of a crime or civil tort. This is just another brick in the wall.

Decius:

What you tell Google you've told the government.

Andy Greenberg:

The exploitation of lawful intercept is more than theoretical.

Wikileaks:

Several rumors from Google sources [allege] that China accessed Google's US Government [lawful] intercept system, which provides Gmail subjects/dates.

A.C. Grayling:

The Chinese government tried to hide the incident. It failed to; think how often it succeeds.

In And Out Through The Backdoor



 
 
Powered By Industrial Memetics
RSS2.0